Thursday, April 18, 2019

Information Security Proposal Essay Example | Topics and Well Written Essays - 500 words

Information Security Proposal - Essay ExampleThis includes the recovery from network downtime. It likewise includes the plans and security in place for theA paradigm can build various meanings. It refers to your basic beliefs and your orgasm to the world which affects the way you define your explore and how you collect and analyse data (Collis & Hussey, 2003, p. 47). The research approaches used in the study comprises a mixture of both the phenomenological paradigm which is also referred to as a qualitative approach, and the positivist paradigm also known as the quantitative approach (Collis & Hussey, 2003, p. 47). As the research will go for interviews to collect data, it would be advantageous to use both the qualitative and quantitative approaches. This will be profitable when conducting interviews, as the phenomenological paradigm supports the researcher to get a feel for the key issues and provides confidence in the trueness and depth of the data stash away as the main i ssues have been covered (Saunders & Lewis & Thornhill, 2000, p. 98). Furthermore, working within the positive(p) paradigm will assist in measuring the data and the correlation between the variables, and the quantitative research outcome could be measured against existing theory.Using a mixture of approaches and techniques has advantages, as all methods have pros and cons. This means utilize a triangulation approach, which as Denzin & Lincoln (2000) explain has been generally considered a process of using multiple perceptions to clarify meaning, verifying the repeatability of an observation or interpretation (p. 443). Using both methods will help ensure that the research outcome is accurate and this will lead to greater confidence being situated in your conclusions (Saunders & Lewis & Thornhill, 2000, p. 99). It also reduces the possibility of getting the answer wrong (Saunders & Lewis & Thornhill, 2000, p. 100). For the research, data will be collected from two types of sources,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.